Twoje urządzenie właśnie ujawniło więcej, niż myślisz.
Ta strona pokazuje, co zwykły link może ujawnić o Twoim urządzeniu, lokalizacji i sieci. Nic nie zostało zainstalowane. Nic nie zostało zhakowane.
Ten był nieszkodliwy. Następny może już nie być.
Losowy kod QR może przekierować do phishingu, przejąć kontekst sesji, fingerprintować urządzenie i przygotować kradzież poświadczeń zanim to zauważysz. Nieznane kody QR traktuj jak potencjalnie wrogie.
We can estimate your region from the network alone. If you allow browser location, we can show how much more precise that becomes.
Coordinates unavailable on this connection Model urządzenia
System operacyjny
Sygnatura przeglądarki
Rozdzielczość ekranu
This is not just trivia. It is reusable context.
Tap a card to see how the same signals can be turned into targeting, tracking, or more convincing scams.
Location A rough location already narrows the search. A city or region guess tells a site where you probably live, work, or travel. See how this can be abused
That is enough to localise phishing messages, fake parcel alerts, language choice, and timing so a scam feels familiar instead of random.
Fingerprint Your browser can become recognisable without a login. Screen size, GPU, language, timezone, and canvas output can combine into a repeatable signature. See how this can be abused
Used together, those clues can link visits, distinguish you from other users on the same network, and help ad-tech or attackers follow the same person over time.
Network Your connection says more than “online”. IP version, provider, ASN, and route hints reveal whether you are on mobile data, home broadband, office Wi-Fi, or something protected. See how this can be abused
That helps attackers choose the right lure and helps platforms decide whether to trust, challenge, throttle, or profile your session.
Device Your device model changes which lies will work. Knowing whether you use an iPhone, Windows PC, or another device shapes what a believable fake prompt looks like. See how this can be abused
A convincing attack starts with context: the right device, the right browser, the right language, and a story that matches what you are actually using.